2012
DOI: 10.1186/1687-1499-2012-73
|View full text |Cite
|
Sign up to set email alerts
|

Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype

Abstract: The proliferation of wireless networks has been remarkable during the last decade. The license-free nature of the ISM band along with the rapid proliferation of the Wi-Fi-enabled devices, especially the smart phones, has substantially increased the demand for broadband wireless access. However, due to their open nature, wireless networks are susceptible to a number of attacks. In this work, we present anomaly-based intrusion detection algorithms for the detection of three types of attacks: (i) attacks performe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…Based on this, we deploy a cumulative-sum (cusum) algorithm [14] able to detect abrupt changes of the SINR. In previous works [15,11,16,17] we show that maximum performance, in terms of false alarms/detection probability, is achieved when considering the maximum minus the minimum values of SINR within a short and long windows. Cusum is defined as:…”
Section: Attack Detectionmentioning
confidence: 99%
“…Based on this, we deploy a cumulative-sum (cusum) algorithm [14] able to detect abrupt changes of the SINR. In previous works [15,11,16,17] we show that maximum performance, in terms of false alarms/detection probability, is achieved when considering the maximum minus the minimum values of SINR within a short and long windows. Cusum is defined as:…”
Section: Attack Detectionmentioning
confidence: 99%
“…Here, an attacker can violate several characteristics of the communication protocol and cause packet collisions, exhausting sensors' resources. The authors in [40] show how a single adversary can cause severe performance degradation by violating several rules of the link layer protocol (back-off mechanism). Another popular attack is the Sybil attack where an adversary maliciously uses the identities of a number of sensors.…”
Section: Common Attacks Against Wsns and Cwsnsmentioning
confidence: 99%
“…Contributions that study the detection of attacks at the link layer include [40]. Here, an anomaly-based algorithm is presented considering the ratio of the corrupted packets over the correctly decoded packets as the metric that reveals jamming when the attacker's energy is emitted on the same channel.…”
Section: Link Layer Attack Detectionmentioning
confidence: 99%
“…Cumulative-sum algorithms for intrusion detection A number of ID algorithms have been proposed in the literature. In our previous studies, we investigated several metrics based on the SINR (or SNR) [4], [22], [23]. We found that the max-min approach, which considers the maximumminus-the minimum value of the SINR in a short window, and its average value in a long window, achieves the best performance.…”
Section: Intrusion Detection Using Compressed Sensingmentioning
confidence: 99%
“…Using SINR and a cumulative-sum (Cusum) algorithm, which has the ability to detect abrupt changes, we can successfully detect the jamming attacks launched at the physical layer of a WN. This algorithm is part of the intrusion detection prototype described in [4].…”
Section: Introductionmentioning
confidence: 99%